SlideShare a Scribd company logo
OSI MODEL
Introduction to OSI Model
• OSI model is based on the proposal developed by the International
Standards Organization (ISO).
• This model is called ISO OSI (Open Systems Interconnection) Reference
model because it deals with connecting open systems (systems that are
open for communication with other systems)
Principles on which OSI model was designed:
• Each layer should perform a well defined function.
• The function of each layer should be chosen according to the internationally standardized
protocols.
• The number of layers should be large enough that distinct functions should not be put in
the same layer and small enough that the architecture does not become very complex.
OSI Model
OSI Layers
5
An Exchange Using the OSI Model
Physical Layer
Physical Layer
• It is the bottom layer of OSI Model.
• It is responsible for the actual physical connection between the devices. Such physical
connection may be made by using twisted pair cable.
• It is concerned with transmitting bits over a communication channel.
Functions of Physical Layer
• Transforming bits into signals
• Provides synchronization of bits by a clock.
• Physical layer manages the way a device connects to network media.
• It defines the transmission rate.
• It defines the way in which the devices are connected to the medium.
• It provides physical topologies
It can use different techniques of multiplexing
Data Link Layer
Functions of Data Link Layer
• Framing : DLL divides the bits received from N/W layer into frames. (Frame contains
all the addressing information necessary to travel from S to D).
• Physical addressing: After creating frames, DLL adds physical address of
sender/receiver (MAC address) in the header of each frame.
• Flow Control: DLL prevents the fast sender from drowning the slow receiver.
• Error Control: It provides the mechanism of error control in which it detects &
retransmits damaged or lost frames.
• Access Control: When single comm. Channel is shared by multiple devices, MAC layer
of DLL provides help to determine which device has control over the channel.
Data Link Layer (Contd.)
o It is responsible for node-to-node delivery of data.
o It receives the data from network layer and creates FRAMES , add
physical address to these frames & pas them to physical layer
o It consist of 2 layers:
o Logical Link Layer (LLC) : Defines the methods and
provides addressing information for communication
between network devices.
o Medium Access Control (MAC): establishes
and maintains links between communicating
devices.
Data Link Layer (Example)
Network Layer
Network Layer (Contd.)
• It is responsible for the source to destination delivery of a packet across multiple
networks.
• If two systems are attached to different networks with devices like routers, then
N/W layer is used.
• Thus DLL overseas the delivery of the packet between the two systems on same
network and the network layer ensures that the packet gets its point of origin to
its final destination.
Functions of Network Layer:
• Internetworking: It provides Internetworking.
• Logical Addressing: When packet is sent outside the network, N/W layer adds Logical
(network) address of the sender & receiver to each packet.
• Network addresses are assigned to local devices by n/w administrator and assigned
dynamically by special server called DHCP (Dynamic Host Configuration Protocol).
• Routing: When independent n/w are connected to create internetwork several routes
are available to send the data from S to D. These n/w are interconnected by routers &
gateways that route the packet to final destination.
Transport Layer
Transport Layer (Contd.)
• It is responsible for process-to-process delivery of the entire message.
• TL looks after the delivery of entire message considering all its packets & make
sure that all packets are in order. On the other hand n/w layer treated each
packet independently.
• At the receiver side, TL provides services to application layer & takes services
form n/w layer.
• At the source side, TL receives message from upper layer into packets and
reassembles these packets again into message at the destination.
Transport Layer (Contd.)
Transport Layer provides two types of services:
• Connection Oriented Transmission: In this type of transmission the receiving devices
sends an acknowledge back to the source after a packet or group of packet is
received. It is slower transmission method.
• Connectionless Transmission: In this type of transmission the receiving devices does
not sends an acknowledge back to the source. It is faster transmission method.
Functions of Transport Layer:
• Segmentation of message into packet & reassembly of packets into
message.
• Port addressing: Computers run several processes. TL header include a
port address with each process.
• Flow Control: Flow control facility prevents the source form sending data
packets faster than the destination can handle.
• Error control: TL ensures that the entire message arrives at the receiving
TL without error.
Session Layer
Session Layer
• Session layer is the fifth layer of OSI Model
• It has the responsibility of beginning, maintaining and ending the communication
between two devices, called session.
• It also provides for orderly communication between devices by regulating the flow of
data.
Functions of Session Layer
• Establishing, Maintaining and ending a session: When sending device first contact with
receiving device, it sends syn (synchronization) packet to establish a connection &
determines the order in which information will be sent. Receiver sends ack
(acknowledgement). So the session can be set & end.
• Dialog Control: This function determines that which device will communicate first and the
amount of data that will be sent.
• Dialog separation: Process of adding checkpoints & markers to the stream of data is called
dialog separation.
Presentation Layer:
Presentation Layer (Contd.)
• Presentation layer is the sixth layer of OSI Model.
• It is concerned with the syntax & semantics of the information exchanged between the
two devices.
• It was designed for data encryption, decryption and compression.
Functions of Presentation Layer
• Data Presentation or Translation: Because different computers use different
encoding systems. It ensures that the data being sent is in the format that the
recipient can process.
• Data Encryption: PL provides this facility by which hides the information from
everyone except the person who originally sent the information & the intended
recipient. When encrypted data arrives at destination, PL decrypts the message.
• Data Compression: PL shrinks large amount of data into smaller pieces i.e. it
reduces the size of data.
Application Layer
Application Layer (Contd.)
• It is the topmost i.e. seventh layer of OSI Model.
• It enables the user to access the network.
• It provides user interface & supports for services such as e-mail, file transfer, access to
the world wide web.
• So it provides services to different user applications.
Functions of Application Layer:
• Mail Services: This application provides various e- mail services.
• File transfer & Access: It allows users to access files in a remote host, to retrieve files
from remote computer for use etc.
• Remote log-in: A user can log into a remote computer and access the resources of
that computer.
• Accessing the World Wide Web: Most common application today is the access of the
World Wide Web.
Thank You!
Functions of Presentation Layer
27
Functions of Application Layer
30

More Related Content

What's hot

low level protocols
low level protocolslow level protocols
low level protocols
9130839673
 
Osi model
Osi modelOsi model
Osi model
prakash N
 
Network (Hub,switches)
Network  (Hub,switches)Network  (Hub,switches)
Network (Hub,switches)
KarthicaMarasamy
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
Tutun Juhana
 
Data link layer
Data link layerData link layer
Data link layer
dhanashrisabale1
 
Osi model
Osi modelOsi model
Osi model
MdAnikKhan
 
Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
Pushpa Yakkala
 
Computer networks-3
Computer networks-3Computer networks-3
Computer networks-3
MSA Technosoft
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsGayathri Kesavan
 
The OSI model
 The OSI model The OSI model
The OSI model
ShofiqulIslam38
 
OSI layer (Network)
OSI layer (Network)OSI layer (Network)
OSI layer (Network)
swethaRajendran1
 
Computer networks-2
Computer networks-2Computer networks-2
Computer networks-2
MSA Technosoft
 
Osi model
Osi modelOsi model
Osi model
Osi modelOsi model
Osi model
sayyed sabir
 
Osi model
Osi model Osi model
Osi model
Josh Marrugo
 
Computer networks-4
Computer networks-4Computer networks-4
Computer networks-4
MSA Technosoft
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
Mukesh Tekwani
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
JAIGANESH SEKAR
 
Osi
OsiOsi

What's hot (20)

low level protocols
low level protocolslow level protocols
low level protocols
 
Osi model
Osi modelOsi model
Osi model
 
Network (Hub,switches)
Network  (Hub,switches)Network  (Hub,switches)
Network (Hub,switches)
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
 
Data link layer
Data link layerData link layer
Data link layer
 
Osi model
Osi modelOsi model
Osi model
 
Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
 
Computer networks-3
Computer networks-3Computer networks-3
Computer networks-3
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
 
Osi model
Osi modelOsi model
Osi model
 
The OSI model
 The OSI model The OSI model
The OSI model
 
OSI layer (Network)
OSI layer (Network)OSI layer (Network)
OSI layer (Network)
 
Computer networks-2
Computer networks-2Computer networks-2
Computer networks-2
 
Osi model
Osi modelOsi model
Osi model
 
Osi model
Osi modelOsi model
Osi model
 
Osi model
Osi model Osi model
Osi model
 
Computer networks-4
Computer networks-4Computer networks-4
Computer networks-4
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
Osi
OsiOsi
Osi
 

Similar to Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020

Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
Zakirul Islam
 
tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
JustinMathew73
 
Dc2 t1
Dc2 t1Dc2 t1
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
Nayan Sarma
 
ch5-osi.pdf
ch5-osi.pdfch5-osi.pdf
ch5-osi.pdf
ssuserc8e1481
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
183JAIDEEP
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
Tutun Juhana
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
ssuserf7cd2b
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
ssuserf7cd2b
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
Shamima Akther
 
OSI MODEL.pptx
OSI MODEL.pptxOSI MODEL.pptx
OSI MODEL.pptx
AnshuKUMARI534030
 
Open system interference reference model.pptx
Open system interference reference model.pptxOpen system interference reference model.pptx
Open system interference reference model.pptx
SwapnilGaikwad138578
 
Network internet
Network internetNetwork internet
Network internetKumar
 
Networks internet
Networks internetNetworks internet
Networks internetKumar
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
MosesOkumu4
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Ammar Shafiq
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptx
DevChaudhari17
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete Syllabus
Anujashejwal
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
BapanKar2
 

Similar to Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020 (20)

Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 
tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
ch5-osi.pdf
ch5-osi.pdfch5-osi.pdf
ch5-osi.pdf
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
OSI MODEL.pptx
OSI MODEL.pptxOSI MODEL.pptx
OSI MODEL.pptx
 
Open system interference reference model.pptx
Open system interference reference model.pptxOpen system interference reference model.pptx
Open system interference reference model.pptx
 
Network internet
Network internetNetwork internet
Network internet
 
Networks internet
Networks internetNetworks internet
Networks internet
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptx
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete Syllabus
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
 

Recently uploaded

Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020

  • 2. Introduction to OSI Model • OSI model is based on the proposal developed by the International Standards Organization (ISO). • This model is called ISO OSI (Open Systems Interconnection) Reference model because it deals with connecting open systems (systems that are open for communication with other systems)
  • 3. Principles on which OSI model was designed: • Each layer should perform a well defined function. • The function of each layer should be chosen according to the internationally standardized protocols. • The number of layers should be large enough that distinct functions should not be put in the same layer and small enough that the architecture does not become very complex.
  • 6. An Exchange Using the OSI Model
  • 8. Physical Layer • It is the bottom layer of OSI Model. • It is responsible for the actual physical connection between the devices. Such physical connection may be made by using twisted pair cable. • It is concerned with transmitting bits over a communication channel. Functions of Physical Layer • Transforming bits into signals • Provides synchronization of bits by a clock. • Physical layer manages the way a device connects to network media. • It defines the transmission rate. • It defines the way in which the devices are connected to the medium. • It provides physical topologies It can use different techniques of multiplexing
  • 10. Functions of Data Link Layer • Framing : DLL divides the bits received from N/W layer into frames. (Frame contains all the addressing information necessary to travel from S to D). • Physical addressing: After creating frames, DLL adds physical address of
  • 11. sender/receiver (MAC address) in the header of each frame. • Flow Control: DLL prevents the fast sender from drowning the slow receiver. • Error Control: It provides the mechanism of error control in which it detects & retransmits damaged or lost frames. • Access Control: When single comm. Channel is shared by multiple devices, MAC layer of DLL provides help to determine which device has control over the channel.
  • 12. Data Link Layer (Contd.) o It is responsible for node-to-node delivery of data. o It receives the data from network layer and creates FRAMES , add physical address to these frames & pas them to physical layer o It consist of 2 layers: o Logical Link Layer (LLC) : Defines the methods and provides addressing information for communication between network devices. o Medium Access Control (MAC): establishes and maintains links between communicating devices.
  • 13. Data Link Layer (Example)
  • 15. Network Layer (Contd.) • It is responsible for the source to destination delivery of a packet across multiple networks. • If two systems are attached to different networks with devices like routers, then N/W layer is used. • Thus DLL overseas the delivery of the packet between the two systems on same network and the network layer ensures that the packet gets its point of origin to its final destination. Functions of Network Layer: • Internetworking: It provides Internetworking. • Logical Addressing: When packet is sent outside the network, N/W layer adds Logical (network) address of the sender & receiver to each packet. • Network addresses are assigned to local devices by n/w administrator and assigned dynamically by special server called DHCP (Dynamic Host Configuration Protocol). • Routing: When independent n/w are connected to create internetwork several routes are available to send the data from S to D. These n/w are interconnected by routers & gateways that route the packet to final destination.
  • 17. Transport Layer (Contd.) • It is responsible for process-to-process delivery of the entire message. • TL looks after the delivery of entire message considering all its packets & make sure that all packets are in order. On the other hand n/w layer treated each packet independently. • At the receiver side, TL provides services to application layer & takes services form n/w layer. • At the source side, TL receives message from upper layer into packets and reassembles these packets again into message at the destination.
  • 18. Transport Layer (Contd.) Transport Layer provides two types of services: • Connection Oriented Transmission: In this type of transmission the receiving devices sends an acknowledge back to the source after a packet or group of packet is received. It is slower transmission method. • Connectionless Transmission: In this type of transmission the receiving devices does not sends an acknowledge back to the source. It is faster transmission method.
  • 19. Functions of Transport Layer: • Segmentation of message into packet & reassembly of packets into message. • Port addressing: Computers run several processes. TL header include a port address with each process. • Flow Control: Flow control facility prevents the source form sending data packets faster than the destination can handle. • Error control: TL ensures that the entire message arrives at the receiving TL without error.
  • 21. Session Layer • Session layer is the fifth layer of OSI Model • It has the responsibility of beginning, maintaining and ending the communication between two devices, called session. • It also provides for orderly communication between devices by regulating the flow of data. Functions of Session Layer • Establishing, Maintaining and ending a session: When sending device first contact with receiving device, it sends syn (synchronization) packet to establish a connection & determines the order in which information will be sent. Receiver sends ack (acknowledgement). So the session can be set & end. • Dialog Control: This function determines that which device will communicate first and the amount of data that will be sent. • Dialog separation: Process of adding checkpoints & markers to the stream of data is called dialog separation.
  • 23. Presentation Layer (Contd.) • Presentation layer is the sixth layer of OSI Model. • It is concerned with the syntax & semantics of the information exchanged between the two devices.
  • 24. • It was designed for data encryption, decryption and compression. Functions of Presentation Layer • Data Presentation or Translation: Because different computers use different encoding systems. It ensures that the data being sent is in the format that the recipient can process. • Data Encryption: PL provides this facility by which hides the information from everyone except the person who originally sent the information & the intended recipient. When encrypted data arrives at destination, PL decrypts the message. • Data Compression: PL shrinks large amount of data into smaller pieces i.e. it reduces the size of data. Application Layer
  • 25. Application Layer (Contd.) • It is the topmost i.e. seventh layer of OSI Model. • It enables the user to access the network. • It provides user interface & supports for services such as e-mail, file transfer, access to the world wide web.
  • 26. • So it provides services to different user applications. Functions of Application Layer: • Mail Services: This application provides various e- mail services. • File transfer & Access: It allows users to access files in a remote host, to retrieve files from remote computer for use etc. • Remote log-in: A user can log into a remote computer and access the resources of that computer. • Accessing the World Wide Web: Most common application today is the access of the World Wide Web.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 42.
  • 43.